US7200777B1 - Audit trail logging and recovery using multiple audit files - Google Patents
Audit trail logging and recovery using multiple audit files Download PDFInfo
- Publication number
- US7200777B1 US7200777B1 US10/330,997 US33099702A US7200777B1 US 7200777 B1 US7200777 B1 US 7200777B1 US 33099702 A US33099702 A US 33099702A US 7200777 B1 US7200777 B1 US 7200777B1
- Authority
- US
- United States
- Prior art keywords
- audit
- files
- block
- trail
- blocks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1471—Saving, restoring, recovering or retrying involving logging of persistent data for recovery
Definitions
- the invention relates to computer systems and, more particularly, techniques for event logging and recovery from system failures.
- an audit trail is a mechanism that records sequential, time-related system event records in an associated audit trail file.
- a database may utilize an associated audit trail to record changes to the database.
- an audit trail may be used to record sequential, time-dependent performance or event records within a transaction-processing environment.
- a common sequential audit trail is a system log audit trail that captures all computer access events in time order.
- the audit trail files may be accessed for a variety of reasons. For example, in the event of database or system failure, a database can be re-constructed from the audit trail. As another example, the audit trail file may be accessed to generate report detailing user access or program error information.
- the audit trail is stored within a respective audit file that resides on a magnetic tape or disc drive storage medium.
- the audit file typically takes the form of sequential audit blocks. More specifically, for a given audit trail, audit trail data may be accumulated in a temporary storage location to form a single audit block. Upon buffering enough audit trail data, the audit block is written to the audit file in one transfer, rather than the many transfers that would otherwise have been required to write each individual record.
- the audit blocks are sequentially written to the audit file, and include timestamps and trail block sequence numbers (TBSNs) that indicate the order in which the events occurred.
- TBSNs trail block sequence numbers
- a recovery utility may retrieve the audit blocks from the audit file and invoke one of a variety of recovery mechanisms. For example, the recovery utility may “replay” one or more of the recorded changes to restore the system to the state prior to the failure. Alternatively, the recovery utility may utilize the audit blocks to rollback the data to a previous state.
- the invention is directed to techniques that utilize multiple audit files for a common audit trail.
- Multiple audit files are assigned to an audit trail, and audit blocks for the trail are written within the audit files.
- variable sized audit data blocks may be sequentially striped among audit files.
- the audit records may be buffered to form an audit block, and the audit block may be written to any of the audit files associated with the audit trail. In this manner, non-duplicate portions of the audit trail data may be stored within different audit files associated with the audit trail.
- a computer system comprises an operating system to generate audit trail data for a sequential audit trail, and an audit control module to receive the audit trail data from the operating system and store non-duplicate portions of the audit trail data within different audit files associated with the audit trail.
- a method comprises receiving one or more requests to store audit trail data, and storing portions of the audit trail data within different audit files associated with a sequential audit trail.
- a method comprises maintaining a queue of file identifiers for audit files associated with a common audit trail.
- the method further comprises receiving a request to store a first block of audit trail data, selecting a first file identifier from the queue, and initiating a write to store the first block of audit trail data to the respective audit file for the first file identifier.
- the method further comprises receiving a request to store a second block of audit trail data, selecting a second file identifier from the queue, and initiating a write to store the second block of audit trail data to the respective audit file for the second file identifier prior to completion of the write of the first block.
- a computing device comprises means for generating audit trail data for a sequential audit trail, and means for storing non-duplicate portions of the audit trail data within different audit files associated with the audit trail.
- the invention may provide one or more advantages.
- the techniques may improve performance of the computing system. For example, since multiple audit files may be used to collectively store audit trail data for an audit trail, multiple audit blocks may be written to the audit trail in parallel. Consequently, the audit blocks need not be written synchronously, as with conventional systems. In other words, the transfer of an audit block to the audit trail need not be delayed until the completion of a previous data transfer to the audit trail.
- the audit control module may provide for the automatic duplication of the audit trail data to further increase reliability.
- the audit control module may store the duplicate audit trail data within a second set of audit files, i.e., a backup “leg” associated with the audit trail.
- the audit control module may support mixed-media in that the sets of audit files may be stored on different types of storage media, e.g., tape media and mass storage media.
- the original audit trail data may be stored within audit files on a disc-based storage medium
- the duplicate audit trail data may be stored within audit files within a tape-based storage medium.
- FIG. 1 is a block diagram illustrating an example computing system in which an operating system utilizes multiple audit files for maintaining an audit trail.
- FIG. 2 is a timing diagram illustrating an example distribution of audit blocks to three audit files associated with a common audit trail.
- FIG. 3 is another timing diagram illustrating an example distribution of audit blocks and duplicate data to a single set of audit files, i.e., a single “leg,” of an audit trail.
- FIG. 4 is another timing diagram illustrating an example distribution of audit blocks and duplicate data to two separate sets of audit files, i.e., separate legs, of an audit trail
- FIG. 5 is a flowchart illustrating example operation of an audit control module.
- FIG. 6 is a block diagram illustrating operation of a recovery utility while recovering from a failure condition.
- FIG. 1 is a block diagram illustrating an example computing system 2 in which an operating system 4 may utilize multiple audit files 5 , 13 for a sequential audit trail.
- operating system 4 generates audit trail data 8 in response to one or more events 9 that, for example, may be received from software applications 6 .
- Operating system 4 invokes an audit control module 10 to store audit trail data 8 among a first (primary) set of audit files 5 , and optionally among a second (backup) set of audit files 13 .
- the term “event” is used to generally refer to any change, action or occurrence within computing system 2 that causes operating system 4 to generate audit trail data 8 .
- an event 9 may be received from software applications 6 (as illustrated), or may be internal to operating system 4 .
- an event may be a command to modify a database, perform an input/output (I/O) operation, or launch or terminate a software application 6 .
- Other example events include the removal of a storage medium, detection of a virus, receipt of a network communication, a logon attempt by a user, and the like.
- Operating system 4 generates audit trail data 8 in the form of one or more audit records 7 A– 7 N that contain event information, e.g., transaction information.
- Audit control module 10 receives audit records 7 via one or more requests, and buffers the records to form one or more audit blocks 11 . Specifically, audit control module 10 buffers audit records 7 to form one of audit blocks 11 , and stores the audit block upon buffering a maximum amount of audit trail data 8 , receipt of a trigger, expiration of a timer, or similar mechanism.
- audit control module 10 may include sequence information within audit blocks 1 .
- the sequence information may, for example, include a block number, a timestamp, and a trail block sequence number (TBSN). More specifically, each of audit blocks 11 may include a timestamp reflecting the time the block was prepared for I/O, a block number that is unique to the file 5 to which the block is written, and a TBSN that is unique to the audit trail. In this manner, the “sequential” nature of the events is persevered within the audit trail even though multiple files may be used.
- audit control module 10 selects one of files 5 to store the audit block.
- audit control module 10 maintains a queue 14 to hold file identifiers (file ids), e.g., filenames and paths, for audit files 5 .
- file ids file identifiers
- Audit control module 10 selects file ids from queue 14 for audit files 5 available for sequential input/output (I/O), and stores newly created audit blocks 11 within the selected audit files.
- Audit control module 10 writes the audit blocks 11 to the selected audit files 5 via I/O layer 12 , which may include software, firmware, hardware, or combinations thereof.
- audit control module 10 Upon successful completion of writing a data block, audit control module 10 returns the selected file id to queue 14 for re-use.
- Audit control module 10 may, for example, return the file id to the top or the bottom of queue 14 . Returning the file id to the top of queue 14 may achieve the benefit of reducing the number of files to which audit blocks 11 are written. Additionally, returning the file id to the top of queue 14 may provide increased performance. In particular, file ids associated with higher-performance storage devices migrate to the top of queue 14 over time, causing these devices to be used more frequently than lower performance devices. Returning the file ids to the bottom of queue 14 , however, may result in a more even distribution of audit blocks 11 to files 5 . Although described in reference to a single queue, multiple queues may readily be used. Moreover, other data structures may be used to store file ids, such as arrays, linked lists, and the like.
- Audit control module 10 generates and stores each newly formed audit control block 11 in similar fashion. In this manner, audit control module 10 may store non-duplicate portions of audit trail data 8 , e.g., different audit blocks 11 , within different audit files 5 for the audit trail. In general, audit control module 10 may utilize these techniques to improve performance of computing system 2 . For example, audit control module 10 may initiate the parallel writing of multiple audit blocks 11 to files 5 . In other words, audit control module 10 need not synchronously write audit blocks 11 , i.e., wait for completion of a first block write prior to initiating a second block write, as with conventional systems.
- audit blocks 11 can be written simultaneously, or at least asynchronously. As a result, any performance impact on software applications 6 may be reduced or minimized by utilizing multiple audit files 5 .
- audit control module 10 may select multiple file ids during a single access of queue 14 .
- audit control module 10 may select a first file id for the current audit block 11 being written, and may pre-select a file id for the next audit block to be written.
- This technique allows audit control module 10 to record the file id for the next time-sequential block as part of the current audit block 11 .
- This provides a forward pointer, i.e., a link, to aid accessing the sequential audit trail when needed.
- a software program e.g., recovery utility 18 , can read an audit block from an audit file 5 , and easily identify the audit file containing the next audit block 11 associated with the sequential audit trail.
- audit control module 10 may provide for the automatic duplication of the audit trail data to further increase reliability of computer system 2 .
- audit control module 10 may automatically generate and store duplicate audit trail data, also referred to herein as a backup “leg” for the audit trail.
- a single audit trail may be viewed as having one or more “legs,” e.g., a primary leg and a backup leg.
- Audit control module 10 may store duplicate audit trail data within the audit files 5 associated with the audit trail, i.e., the same audit files used to stored audit data 8 .
- audit control module 10 may utilize a second (backup) set of audit files 13 associated with the audit trail. In other words, audit control module 10 may write audit data 8 to audit files 5 , and the duplicate audit data to audit files 13 associated with the same audit trail.
- Audit control module 10 may be configured to support mixed-media in that each set of audit files 5 for the legs may be stored on different types of storage media, e.g., a tape media and a mass storage media.
- audit control module 10 may store audit trail data 8 within files on a disc-based storage medium, and possibly a removable storage medium, and may store duplicate audit data within audit files on a tape-based storage medium.
- the utilization of mixed media can provide for automatic data archive to tape media.
- the number of files configured for use with each leg may be different. For example, a reduced number of files may be defined for tape media. This may have the benefit of reducing the number of tape files to service, and may provide a tape performance benefit by allowing a tape device to remain in streaming mode for longer periods.
- audit control module 10 maintains an audit recovery file 15 and an audit control interface (ACI) file 17 . More specifically, audit control module 10 maintains ACI file 17 to contain usage information for audit data files 5 .
- audit control module 10 may store a variety of usage information within ACI file 17 , such as file ids for files 5 , 13 , data indicating the types of media used for storing the files, start and end times for the audit trail, general audit trail statistics, and the like, written in time-sequence order.
- audit control module 10 maintains information in audit recovery file 15 to record a recovery status for each of audit files 5 , 13 .
- audit recovery file 15 records information identifying the files to re-assign, media type, and a recovery address for mass storage files 5 , 13 so that in the event of a system outage, e.g., power failure, audit trail recovery module 16 can be invoked to recover the audit trail files.
- audit control module 10 periodically updates audit recovery file 15 , e.g., every minute, with a current recovery address of the last audit block 11 written to each audit file 5 .
- audit control module 10 includes within each audit block 11 a specially formatted sentinel record that is “appended” to the end of each audit block. This sentinel record is written over by the next audit block written and, as a result, indicates the last valid audit block written to each of files 5 , 13 .
- audit trail recovery module 16 “re-assigns” all audit files 5 , i.e., ensures that all files 5 are accessible.
- audit control module 10 may oversee preparation of on or more storage media to ensure the necessary files 5 , 13 are accessible for recovery.
- the recovery address is used to read forward on each mass storage file until the sentinel block is found indicating end of valid data.
- Tape files are typically not dismounted during a system outage, and are therefore already positioned at the end of the last block written. Tape files are re-assigned by audit recovery module 16 . Each tape file is moved back a single block, and a single block read can be used to recover the last block written to each tape file.
- audit trail recovery module 16 may need to re-sequence the data blocks to ensure the integrity of the sequential audit data stored within files 5 , 13 for the audit trail.
- I/O layer 12 may have initiated multiple data block writes to files 5 , 13 .
- not all of the data blocks may have been written prior to the system failure.
- the block writes were issued asynchronously, they may not have completed in the order in which they were issued.
- files 5 , 13 may store non-sequential audit blocks, and may need to be re-sequenced to restore the sequential nature of the audit trail.
- recovery module 16 reads files 5 , 13 to locate the last valid data block written therein. For example, audit trail recovery module 16 may identify a highest of the sequential TBSNs for audit blocks 11 successfully stored within the respective audit files. During this process, recovery module 16 may determine that a block with, for example, TBSN X is not present within any file, but a block having a greater TBSN, e.g., TBSN X+ 1 , is present. In this instance, the integrity of the audit trail has been compromised, and the files 5 , 13 , or both, must be re-sequenced.
- TBSN X This may easily be accomplished under certain circumstances when the missing block or blocks, e.g., the TBSN X block, can be recovered from memory. In some situations, for example, audit blocks 11 buffered within operating system 4 may be recovered upon rebooting the computing system 2 . In other circumstances, a duplicate of TBSN block X+1 may be present in one of backup files 13 , which can be used re-sequencing files 5 . In this circumstance, TBSN block X can be retrieved from one of files 13 , and written to one of files 5 .
- recovery utility 18 may access the audit control interface file 17 , to invoke one of a variety of recovery mechanisms to restore the software application data to a consistent state. For example, records may be discarded from applications 6 in a roll back technique, or may be applied, i.e., rolled forward, to complete an in-progress action to the application 6 .
- recovery modules 16 and 18 Once recovery modules 16 and 18 have completed their respective operations, and associated application 6 files are consistent, audit control module 10 continues buffering and recording new audit data 8 .
- FIG. 2 is a timing diagram 30 illustrating an example distribution of audit blocks 11 to three audit files 5 associated with a common audit trail.
- audit control module 10 selects a first file identifier from queue 14 , and initiates a write of a first one of audit blocks 11 (BLOCK 1 ) to a first file (FILE 1 ) at a time T 0 .
- audit control module 10 subsequently initiates a write of a second audit block (BLOCK 2 ) to a second file (FILE 2 ) at a time T 1 , and a write of a third audit block (BLOCK 3 ) to a third file (FILE 3 ) at a time T 2 .
- audit control module 10 initiates the writes in parallel, i.e., prior to completing the write of the previous audit blocks. For example, audit control module 10 initiates the write of BLOCK 2 prior to completing the write of BLOCK 1 . Similarly, audit control module 10 initiates the write of BLOCK 3 prior to completing the write of BLOCK 2 .
- the time delay between the first write and the second write i.e., the time difference between T 0 and T 1 , is a result of audit control module 10 buffering audit trail data 8 to form another audit block 11 , i.e., BLOCK 2 .
- the time delay between the second write and the third write is a result of audit control module 10 buffering audit trail data 8 to form BLOCK 3 . Accordingly, these time delays do not necessarily represent any performance degradation.
- audit control module 10 Upon forming a forth audit block (BLOCK 4 ), audit control module 10 selects another file identifier from the queue 14 . In this example, only three audit files 5 are associated with the audit trail. Consequently, audit control module 10 writes BLOCK 4 to one of the three files, e.g., FILE 1 . In particular, audit control module 10 writes BLOCK 4 to any one of the audit files 5 that is currently available, i.e., finished with a prior block write. Upon completion of a block write to a file 5 , the associated file id is returned to queue 14 for reuse.
- BLOCK 4 Upon completion of a block write to a file 5 , the associated file id is returned to queue 14 for reuse.
- audit control module 10 writes BLOCK 4 to FILE 1 at time T 3 .
- audit control module 10 writes BLOCK 5 to FILE 2 at time T 4 , and BLOCK 6 to FILE 1 at time T 5 .
- FIG. 3 is another timing diagram 40 illustrating an example distribution of audit blocks 11 and duplicate data in a single set of audit files, e.g., FILES 1 – 3 .
- audit control module 10 initiates a write of a first one of audit blocks 111 (BLOCK 1 ) to a first file (FILE 1 ) and a write of a copy of the block (COPY 1 ) to a second file (FILE 2 ) at a time T 0 .
- audit control module 10 initiates a write of a second audit block (BLOCK 2 ) to a third file (FILE 3 ) at a time T 1 .
- BLOCK 2 second audit block
- FILE 3 third file
- audit control module 10 waits until a time T 2 to initiate a write of a duplication of the block (COPY 2 ) to FILE 1 .
- audit control module 10 initiates a write of a third audit block (BLOCK 3 ) and a duplicate (COPY 3 ) at a time T 3 .
- BLOCK 3 third audit block
- COPD 3 duplicate
- FIG. 4 is another timing diagram 50 that illustrates an example storage of data blocks 11 and duplicate data in different sets of files, e.g., primary audit files 5 and backup audit files 13 , associated with the audit trail.
- audit control module 10 stores audit blocks 11 in FILES 1 A– 3 A, and stores duplicate data in FILES 1 B– 3 B.
- the method illustrated in FIG. 3 writes a block to one file of file set 5 , and writes a copy block to any other file in the file set.
- the method illustrated in FIG. 4 writes a block to a file in file set 5 , and writes a copy of the block to a file in backup file set 13 .
- the first method may offer the advantage of requiring fewer files to generally provide similar performance to the second method. However, the first method cannot tolerate the loss of any two files. In other words, recovery may not be possible in the event two files are corrupted or otherwise inaccessible.
- the second method i.e., the method illustrated in FIG. 4
- the second method may provide for physical separation of the file sets. More particularly, the files in one set may be managed to be physically separate from the other file set.
- audit control module 10 may require or otherwise enforce a rule that storage media for files 5 , 13 be associated with locations that are physically separate. For example, the two files sets may be physically located in separate buildings of an enterprise.
- the second method reduces any risk of a catastrophic loss of data, e.g., due to flood, fire, explosion, and the like.
- Audit control module 10 may incorporate either method to manage duplicate data.
- Audit control module 10 may allow a system administrator to configure the number of files assigned to each leg of the audit trail, and whether a separate set of files is used for any duplicate data generated for the audit trail. Increasing the number of audit files 5 tends to reduce the likelihood of delays while recording audit blocks 11 . However, this potential benefit may be offset by the increased complexity of file management. Audit control module 10 may maintain counters related to files 5 and buffering utilization. This information may be available to a system operator, and may be written to audit control interface file 17 for later reference. A system administrator may analyze this data to readily determine the number of files 5 , and buffer sizes necessary to provide the desired performance using the least number of files and buffer space.
- FIG. 5 is a flowchart illustrating example operation of audit control module 10 .
- audit control module 10 selects storage media for leg of the audit trail, possibly based on configurable settings received from a system administrator ( 60 ). For example, a system administrator may select a first type of media for one audit file, and a second type of media for a second audit file. Further, the system administrator may assign different media for storing original audit blocks 11 and duplicate data to further increase reliability of computing system 2 .
- audit control module 10 assigns the number of audit data files 5 for each leg of the audit trail ( 62 ). As described above, audit control module 10 may assign the number of files to each leg based on configurable settings, past performance statistics, or both. Audit control module 10 initializes queue 14 to store file ids for the assigned files ( 64 ). The file ids may, for example, uniquely identify the file and the respective storage storing the file.
- audit control module 10 Upon receiving sufficient audit event ( 68 ) to form an audit block 1 , audit control module 10 selects a file id from file queues 14 ( 72 ), and initiates a write of the audit data block to the selected file ( 74 ). If the audit trail is configured as duplex ( 76 ), i.e., for automatic generation and storage of duplicate audit trail data, audit control module 10 initiates a write of a copy of the audit block ( 78 ). Audit control module 10 may terminate the audit process for a variety of reasons ( 79 ), such as receiving a termination request from the system administrator.
- FIG. 6 is a block diagram illustrating operation of computing system 2 while recovering from a failure condition.
- audit trail recovery module 16 initiates a recovery process ( 80 ) based on the contents of the audit recovery file 15 to assign and access audit data files 5 and read the last valid data blocks written within each of the audit files 5 ( 82 ).
- recovery module 16 identifies a highest consecutive trail block sequence number (TBSN) that was successfully stored within each of the audit files 5 .
- TBSN trail block sequence number
- audit trail recovery module 16 writes any blocks which could have been or were submitted for I/O, and that had not completed at the time of the system outage ( 88 ). For example, if a block having TBSN N+1 is recoverable from memory, then audit control module 10 may retrieve the block and store the block to audit files 5 without removing block TBSN N+2.
- Recovery module 16 then re-sequences the audit trail to the point of failure ( 90 ).
- recovery module 16 may remove, e.g., overwrite, any of stored audit blocks 11 that have TBSNs that exceed the identified TBSN.
- recovery module 16 may remove from the audit files one or more audit blocks 11 having higher TBSNs in the event an audit block 11 having a lower TBSN was not successfully written prior to the failure. For example, if audit data blocks having TBSNs of 1 through N and N+2 were successfully written to the audit files prior to a system failure, the “point of failure” for the audit trail is the block having TBSN N+1.
- recovery module 16 removes the block having TBSN of N+2 from the audit files to resynchronize them to the point of failure.
- recovery utility 18 may send one or more requests to software applications 6 to apply (roll forward) or discard (roll back) data to ensure applications 6 are restored to a consistent state. Finally, recovery utility 18 notifies audit control module 10 to resume auditing 8 within the audit trail.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (37)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/330,997 US7200777B1 (en) | 2002-12-27 | 2002-12-27 | Audit trail logging and recovery using multiple audit files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/330,997 US7200777B1 (en) | 2002-12-27 | 2002-12-27 | Audit trail logging and recovery using multiple audit files |
Publications (1)
Publication Number | Publication Date |
---|---|
US7200777B1 true US7200777B1 (en) | 2007-04-03 |
Family
ID=37897716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/330,997 Expired - Fee Related US7200777B1 (en) | 2002-12-27 | 2002-12-27 | Audit trail logging and recovery using multiple audit files |
Country Status (1)
Country | Link |
---|---|
US (1) | US7200777B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060277162A1 (en) * | 2005-06-02 | 2006-12-07 | Smith Alan R | Apparatus, system, and method for condensing reported checkpoint log data |
US20090164496A1 (en) * | 2007-12-19 | 2009-06-25 | Microsoft Corporation | Integrated governance and version audit logging |
US9659041B2 (en) * | 2012-01-30 | 2017-05-23 | Oracle International Corporation | Model for capturing audit trail data with reduced probability of loss of critical data |
US11748212B1 (en) * | 2021-06-28 | 2023-09-05 | Gravic, Inc. | Method and apparatus for resolving automatic transaction facility (ATF) failures |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6079000A (en) * | 1997-12-30 | 2000-06-20 | Unisys Corporation | XPC backup for in-process audit |
US6085200A (en) * | 1997-12-23 | 2000-07-04 | Unisys Corporation | System and method for arranging database restoration data for efficient data recovery in transaction processing systems |
US6324548B1 (en) * | 1999-07-22 | 2001-11-27 | Unisys Corporation | Database backup and recovery using separate history files for database backup and audit backup |
US6408310B1 (en) * | 1999-10-08 | 2002-06-18 | Unisys Corporation | System and method for expediting transfer of sectioned audit files from a primary host to a secondary host |
US6539402B1 (en) * | 2000-02-22 | 2003-03-25 | Unisys Corporation | Using periodic spaces of block ID to improve additional recovery |
US6701456B1 (en) * | 2000-08-29 | 2004-03-02 | Voom Technologies, Inc. | Computer system and method for maintaining an audit record for data restoration |
-
2002
- 2002-12-27 US US10/330,997 patent/US7200777B1/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6085200A (en) * | 1997-12-23 | 2000-07-04 | Unisys Corporation | System and method for arranging database restoration data for efficient data recovery in transaction processing systems |
US6079000A (en) * | 1997-12-30 | 2000-06-20 | Unisys Corporation | XPC backup for in-process audit |
US6324548B1 (en) * | 1999-07-22 | 2001-11-27 | Unisys Corporation | Database backup and recovery using separate history files for database backup and audit backup |
US6408310B1 (en) * | 1999-10-08 | 2002-06-18 | Unisys Corporation | System and method for expediting transfer of sectioned audit files from a primary host to a secondary host |
US6539402B1 (en) * | 2000-02-22 | 2003-03-25 | Unisys Corporation | Using periodic spaces of block ID to improve additional recovery |
US6701456B1 (en) * | 2000-08-29 | 2004-03-02 | Voom Technologies, Inc. | Computer system and method for maintaining an audit record for data restoration |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060277162A1 (en) * | 2005-06-02 | 2006-12-07 | Smith Alan R | Apparatus, system, and method for condensing reported checkpoint log data |
US7493347B2 (en) * | 2005-06-02 | 2009-02-17 | International Business Machines Corporation | Method for condensing reported checkpoint log data |
US20090164496A1 (en) * | 2007-12-19 | 2009-06-25 | Microsoft Corporation | Integrated governance and version audit logging |
US8165994B2 (en) | 2007-12-19 | 2012-04-24 | Microsoft Corporation | Integrated governance and version audit logging |
US9659041B2 (en) * | 2012-01-30 | 2017-05-23 | Oracle International Corporation | Model for capturing audit trail data with reduced probability of loss of critical data |
US11748212B1 (en) * | 2021-06-28 | 2023-09-05 | Gravic, Inc. | Method and apparatus for resolving automatic transaction facility (ATF) failures |
US12099416B1 (en) | 2021-06-28 | 2024-09-24 | Gravic, Inc. | Apparatus for resolving automatic transaction facility (ATF) failures |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7194487B1 (en) | System and method for recording the order of a change caused by restoring a primary volume during ongoing replication of the primary volume | |
US7433903B1 (en) | Method for reading audit data from a remote mirrored disk for application to remote database backup copy | |
US7606841B1 (en) | Coordinated dirty block tracking | |
US7627776B2 (en) | Data backup method | |
US7406488B2 (en) | Method and system for maintaining data in a continuous data protection system | |
US7325159B2 (en) | Method and system for data recovery in a continuous data protection system | |
US6820098B1 (en) | System and method for efficient and trackable asynchronous file replication | |
US7315965B2 (en) | Method and system for storing data using a continuous data protection system | |
US8473465B2 (en) | Data mirroring system | |
US7406575B2 (en) | Method and system for storing data | |
US7464126B2 (en) | Method for creating an application-consistent remote copy of data using remote mirroring | |
US7624109B2 (en) | Distributed asynchronous ordered replication | |
US7720817B2 (en) | Method and system for browsing objects on a protected volume in a continuous data protection system | |
US7979654B2 (en) | Method and system for restoring a volume in a continuous data protection system | |
US7308545B1 (en) | Method and system of providing replication | |
US9910592B2 (en) | System and method for replicating data stored on non-volatile storage media using a volatile memory as a memory buffer | |
JP3938475B2 (en) | Backup processing method, its execution system, and its processing program | |
Nelson | Pro data backup and recovery | |
JPH07239799A (en) | Method for provision of remote data shadowing and remote data duplex system | |
US20040044705A1 (en) | Optimized disk repository for the storage and retrieval of mostly sequential data | |
US7657671B2 (en) | Adaptive resilvering I/O scheduling | |
JPH07244597A (en) | Method and related system for forming consistent group for providing disaster restoration function | |
WO2011110542A1 (en) | Buffer disk in flashcopy cascade | |
US20110137874A1 (en) | Methods to Minimize Communication in a Cluster Database System | |
US7200777B1 (en) | Audit trail logging and recovery using multiple audit files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: UNISYS CORPORATION, MINNESOTA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOUCHEE, DICK G.;REEL/FRAME:013622/0079 Effective date: 20021219 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:UNISYS CORPORATION;UNISYS HOLDING CORPORATION;REEL/FRAME:018003/0001 Effective date: 20060531 Owner name: CITIBANK, N.A.,NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:UNISYS CORPORATION;UNISYS HOLDING CORPORATION;REEL/FRAME:018003/0001 Effective date: 20060531 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION, DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS CORPORATION,PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION,DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION, DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS CORPORATION,PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION,DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: PATENT SECURITY AGREEMENT (PRIORITY LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023355/0001 Effective date: 20090731 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: PATENT SECURITY AGREEMENT (JUNIOR LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023364/0098 Effective date: 20090731 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: GENERAL ELECTRIC CAPITAL CORPORATION, AS AGENT, IL Free format text: SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:026509/0001 Effective date: 20110623 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY;REEL/FRAME:030004/0619 Effective date: 20121127 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE;REEL/FRAME:030082/0545 Effective date: 20121127 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001 Effective date: 20170417 Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001 Effective date: 20170417 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081 Effective date: 20171005 Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081 Effective date: 20171005 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION (SUCCESSOR TO GENERAL ELECTRIC CAPITAL CORPORATION);REEL/FRAME:044416/0358 Effective date: 20171005 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20190403 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:054231/0496 Effective date: 20200319 |